cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2188
Views
0
Helpful
5
Replies

ISE per user policy map

peter.matuska1
Level 1
Level 1

Hi,

ISE 2.7 with Catalyst 9300. I want to apply policy-map on an interface as a result of authorization. The goal is to limit the speed for the connected device to 15/15M.

Is it possible? What av-pair to use?

thank you

1 Accepted Solution

Accepted Solutions

Greg Gibbs
Cisco Employee
Cisco Employee

You might try this approach. I have not tested the traffic policing, but I have confirmed that the policy-map is applied in my lab.

Create an empty class-map (e.g. CLASS_POLICE) and a policy-map (e.g. POLICY_POLICE) on the switch as per this guide.

Create a new template (e.g. NAC_Police) on the switch with the same configuration as your NAC template (e.g. DefaultWiredDot1xOpenAuth) but with the added configuration of your Policing policy (service-policy input POLICY_POLICE).

In your ISE AuthZ Profile, enable the Common Task for 'Interface Template' and specify your new template name (NAC_Police).

Upon authZ, you should see the Interface Template applied to the session:

sw1#show access-sess interf gig0/x det 
            Interface:  GigabitEthernet0/x
<snip>
       Current Policy:  PMAP_DefaultWiredDot1xOpenAuth_1X_MAB

Server Policies:
<snip>
   Interface Template:  NAC_Police
              ACS ACL:  xACSACLx-IP-MM-DACL-AD-User-609cc325

You should also see the service-policy applied in the derived-config:

sw1#show derived-config int gig0/x
Building configuration...

Derived configuration : 507 bytes
!
interface GigabitEthernet0/x
<snip>
 service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB
 service-policy input POLICY_POLICE
end

View solution in original post

5 Replies 5

Hi,

These attributes work for WLC but not sure about IOS. Try them from
authorization results > advanced attributes > radius. You can verify them
using show session interface x/x details and see what has been passed from
server policies.

Aire-Real-Time-Bandwidth-Average-UpStream-Contract
Aire-Data-Bandwidth-Average-DownStream-Contract
Aire-Data-Bandwidth-Burst-UpStream-Contract
Aire-Real-Time-Bandwidth-Burst-DownStream-Contract
Aire-Real-Time-Bandwidth-Average-DownStream-Contract
Aire-Real-Time-Bandwidth-Burst-UpStream-Contract
Aire-Data-Bandwidth-Average-UpStream-Contract
Aire-Data-Bandwidth-Burst-DownStream-Contract

**** please remember to rate useful posts

thank you, but didn't work.

I did some research and seems its possible on routers with ISG enabled
(usually service providers enviroments).

See below doc

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/isg/configuration/xe-3s/isg-xe-3s-book/isg-radius-pol.html

***** please remember to rate useful posts

Greg Gibbs
Cisco Employee
Cisco Employee

You might try this approach. I have not tested the traffic policing, but I have confirmed that the policy-map is applied in my lab.

Create an empty class-map (e.g. CLASS_POLICE) and a policy-map (e.g. POLICY_POLICE) on the switch as per this guide.

Create a new template (e.g. NAC_Police) on the switch with the same configuration as your NAC template (e.g. DefaultWiredDot1xOpenAuth) but with the added configuration of your Policing policy (service-policy input POLICY_POLICE).

In your ISE AuthZ Profile, enable the Common Task for 'Interface Template' and specify your new template name (NAC_Police).

Upon authZ, you should see the Interface Template applied to the session:

sw1#show access-sess interf gig0/x det 
            Interface:  GigabitEthernet0/x
<snip>
       Current Policy:  PMAP_DefaultWiredDot1xOpenAuth_1X_MAB

Server Policies:
<snip>
   Interface Template:  NAC_Police
              ACS ACL:  xACSACLx-IP-MM-DACL-AD-User-609cc325

You should also see the service-policy applied in the derived-config:

sw1#show derived-config int gig0/x
Building configuration...

Derived configuration : 507 bytes
!
interface GigabitEthernet0/x
<snip>
 service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB
 service-policy input POLICY_POLICE
end

thank you. this worked.